This module explains how to analyze the existing Active Directory
infrastructure to ensure optimal performance for Exchange users. It also
explains how to create a well-designed administrative plan and group strategy,
which will enable the student to effectively plan and manage resources, allocate
administrative responsibilities, and provide secure access.

This module provides the knowledge and skills needed to design an effective
routing topology. This process includes determining how many routing groups are
needed, where to locate each group, how messages will flow through the various
groups, and how to connect them to one another. In addition, the roles that
Exchange servers can hold in an Exchange organization and the placement of
servers are examined.

This module explains how to design a public folder strategy that includes
placement and replication of public folders. In addition, it also discusses the
hardware requirements needed to effectively configure a public folder server.

Lessons

Analyzing Business Requirements for Public Folders

Analyzing Logistical Requirements for Public Folders

Analyzing Administrative and Permission Requirements for Public Folders

Analyzing Hardware Requirements for Public Folders

Practice: Designing a Public Folder Replication Strategy

After completing this module, students will be able to:

Analyze business requirements for public folders.

Analyze logistical requirements for public folders.

Analyze administrative and permission requirements for public folders.

Analyze hardware requirements for public folders.

Модуль 4. Module 4: Design an Exchange Server 2003 Security Strategy

This module explains how to identify security risks and design a security
strategy that protects from both internal and external attacks. In addition, the
requirements for an encryption strategy and rights management are discussed.

Lessons

Designing Exchange Server 2003 Perimeter Security

Designing Exchange Server 2003 Intranet Security

Practice: Planning Exchange Server 2003 Intranet Security

Designing an Encryption Strategy

Practice: Designing an Encryption Strategy

Protecting Intellectual Property with Information Rights Management

After completing this module, students will be able to:

Design Exchange Server 2003 perimeter security.

Design Exchange Server 2003 intranet security.

Design an encryption strategy.

Protect intellectual property with information rights management.

Модуль 5. Module 5: Design for High Availability and Reliability

This module explains how to design a highly available and reliable messaging
system, including front-end and back-end servers, reliable Domain Name System
(DNS) infrastructure, storage technologies, and clustering.

Lessons

Designing for System-Wide Reliability

Designing for Active Directory and DNS Availability

Designing Front-End Server Availability

Designing Back-End Server and Data Availability

Designing Exchange Server Data Storage Solutions

After completing this module, students will be able to:

Design for System-Wide Reliability.

Design for Active Directory and DNS Availability.

Design Front-End Server Availability.

Design Back-End Server and Data Availability.

Design Exchange Server Data Storage Solutions.

Модуль 6. Module 6: Design Inter-organizational Connectivity

This module explains how to design a global directory system by propagating
users, contacts, and groups from one forest GAL as contacts into the GAL of the
other forest so Exchange Server users in one forest can search for employees
from another forest in their local GAL which is stored in their forest's Active
Directory.